diff options
author | Niels Möller <nisse@lysator.liu.se> | 2014-01-29 15:13:54 +0100 |
---|---|---|
committer | Niels Möller <nisse@lysator.liu.se> | 2014-01-29 15:13:54 +0100 |
commit | 587855374c50562acf598660e173e76c6e3195bb (patch) | |
tree | 2a8169192ca0c6df7cdbf230094f497680996a67 /examples | |
parent | f508b1fe613f06c571bdc1997cd006f95874d4cb (diff) | |
download | nettle-587855374c50562acf598660e173e76c6e3195bb.tar.gz |
Dropped length argument from nettle_set_key_func.set_key-changes
Diffstat (limited to 'examples')
-rw-r--r-- | examples/nettle-benchmark.c | 14 | ||||
-rw-r--r-- | examples/nettle-openssl.c | 70 |
2 files changed, 54 insertions, 30 deletions
diff --git a/examples/nettle-benchmark.c b/examples/nettle-benchmark.c index 5ac6d4c4..7e15a18e 100644 --- a/examples/nettle-benchmark.c +++ b/examples/nettle-benchmark.c @@ -427,7 +427,7 @@ time_gcm(void) uint8_t key[AES128_KEY_SIZE]; uint8_t iv[GCM_IV_SIZE]; - gcm_aes128_set_key(&ctx, sizeof(key), key); + gcm_aes128_set_key(&ctx, key); gcm_aes128_set_iv(&ctx, sizeof(iv), iv); hinfo.ctx = &ctx; @@ -461,7 +461,7 @@ time_eax(void) uint8_t key[AES128_KEY_SIZE]; uint8_t iv[EAX_BLOCK_SIZE]; - eax_aes128_set_key (&ctx, sizeof(key), key); + eax_aes128_set_key (&ctx, key); eax_aes128_set_nonce(&ctx, sizeof(iv), iv); hinfo.ctx = &ctx; @@ -521,7 +521,7 @@ time_cipher(const struct nettle_cipher *cipher) info.data = data; init_key(cipher->key_size, key); - cipher->set_encrypt_key(ctx, cipher->key_size, key); + cipher->set_encrypt_key(ctx, key); display(cipher->name, "ECB encrypt", cipher->block_size, time_function(bench_cipher, &info)); @@ -534,7 +534,7 @@ time_cipher(const struct nettle_cipher *cipher) info.data = data; init_key(cipher->key_size, key); - cipher->set_decrypt_key(ctx, cipher->key_size, key); + cipher->set_decrypt_key(ctx, key); display(cipher->name, "ECB decrypt", cipher->block_size, time_function(bench_cipher, &info)); @@ -555,7 +555,7 @@ time_cipher(const struct nettle_cipher *cipher) memset(iv, 0, sizeof(iv)); - cipher->set_encrypt_key(ctx, cipher->key_size, key); + cipher->set_encrypt_key(ctx, key); display(cipher->name, "CBC encrypt", cipher->block_size, time_function(bench_cbc_encrypt, &info)); @@ -571,7 +571,7 @@ time_cipher(const struct nettle_cipher *cipher) memset(iv, 0, sizeof(iv)); - cipher->set_decrypt_key(ctx, cipher->key_size, key); + cipher->set_decrypt_key(ctx, key); display(cipher->name, "CBC decrypt", cipher->block_size, time_function(bench_cbc_decrypt, &info)); @@ -588,7 +588,7 @@ time_cipher(const struct nettle_cipher *cipher) memset(iv, 0, sizeof(iv)); - cipher->set_encrypt_key(ctx, cipher->key_size, key); + cipher->set_encrypt_key(ctx, key); display(cipher->name, "CTR", cipher->block_size, time_function(bench_ctr, &info)); diff --git a/examples/nettle-openssl.c b/examples/nettle-openssl.c index 8ef0c025..25aa5e97 100644 --- a/examples/nettle-openssl.c +++ b/examples/nettle-openssl.c @@ -50,18 +50,43 @@ /* AES */ -static nettle_set_key_func openssl_aes_set_encrypt_key; +static nettle_set_key_func openssl_aes128_set_encrypt_key; +static nettle_set_key_func openssl_aes128_set_decrypt_key; +static nettle_set_key_func openssl_aes192_set_encrypt_key; +static nettle_set_key_func openssl_aes192_set_decrypt_key; +static nettle_set_key_func openssl_aes256_set_encrypt_key; +static nettle_set_key_func openssl_aes256_set_decrypt_key; static void -openssl_aes_set_encrypt_key(void *ctx, size_t length, const uint8_t *key) +openssl_aes128_set_encrypt_key(void *ctx, const uint8_t *key) { - AES_set_encrypt_key(key, length * 8, ctx); + AES_set_encrypt_key(key, 128, ctx); +} +static void +openssl_aes128_set_decrypt_key(void *ctx, const uint8_t *key) +{ + AES_set_decrypt_key(key, 128, ctx); } -static nettle_set_key_func openssl_aes_set_decrypt_key; static void -openssl_aes_set_decrypt_key(void *ctx, size_t length, const uint8_t *key) +openssl_aes192_set_encrypt_key(void *ctx, const uint8_t *key) +{ + AES_set_encrypt_key(key, 192, ctx); +} +static void +openssl_aes192_set_decrypt_key(void *ctx, const uint8_t *key) +{ + AES_set_decrypt_key(key, 192, ctx); +} + +static void +openssl_aes256_set_encrypt_key(void *ctx, const uint8_t *key) +{ + AES_set_encrypt_key(key, 256, ctx); +} +static void +openssl_aes256_set_decrypt_key(void *ctx, const uint8_t *key) { - AES_set_decrypt_key(key, length * 8, ctx); + AES_set_decrypt_key(key, 256, ctx); } static nettle_crypt_func openssl_aes_encrypt; @@ -98,7 +123,7 @@ const struct nettle_cipher nettle_openssl_aes128 = { "openssl aes128", sizeof(AES_KEY), 16, 16, - openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key, + openssl_aes128_set_encrypt_key, openssl_aes128_set_decrypt_key, openssl_aes_encrypt, openssl_aes_decrypt }; @@ -109,7 +134,7 @@ nettle_openssl_aes192 = { * (as openssl cipher + nettle cbc is somewhat pointless to * benchmark). */ 16, 24, - openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key, + openssl_aes192_set_encrypt_key, openssl_aes192_set_decrypt_key, openssl_aes_encrypt, openssl_aes_decrypt }; @@ -120,16 +145,16 @@ nettle_openssl_aes256 = { * (as openssl cipher + nettle cbc is somewhat pointless to * benchmark). */ 16, 32, - openssl_aes_set_encrypt_key, openssl_aes_set_decrypt_key, + openssl_aes256_set_encrypt_key, openssl_aes256_set_decrypt_key, openssl_aes_encrypt, openssl_aes_decrypt }; /* Arcfour */ -static nettle_set_key_func openssl_arcfour_set_key; +static nettle_set_key_func openssl_arcfour128_set_key; static void -openssl_arcfour_set_key(void *ctx, size_t length, const uint8_t *key) +openssl_arcfour128_set_key(void *ctx, const uint8_t *key) { - RC4_set_key(ctx, length, key); + RC4_set_key(ctx, 16, key); } static nettle_crypt_func openssl_arcfour_crypt; @@ -144,16 +169,16 @@ const struct nettle_cipher nettle_openssl_arcfour128 = { "openssl arcfour128", sizeof(RC4_KEY), 0, 16, - openssl_arcfour_set_key, openssl_arcfour_set_key, + openssl_arcfour128_set_key, openssl_arcfour128_set_key, openssl_arcfour_crypt, openssl_arcfour_crypt }; /* Blowfish */ -static nettle_set_key_func openssl_bf_set_key; +static nettle_set_key_func openssl_bf128_set_key; static void -openssl_bf_set_key(void *ctx, size_t length, const uint8_t *key) +openssl_bf128_set_key(void *ctx, const uint8_t *key) { - BF_set_key(ctx, length, key); + BF_set_key(ctx, 16, key); } static nettle_crypt_func openssl_bf_encrypt; @@ -190,7 +215,7 @@ const struct nettle_cipher nettle_openssl_blowfish128 = { "openssl bf128", sizeof(BF_KEY), 8, 16, - openssl_bf_set_key, openssl_bf_set_key, + openssl_bf128_set_key, openssl_bf128_set_key, openssl_bf_encrypt, openssl_bf_decrypt }; @@ -198,9 +223,8 @@ nettle_openssl_blowfish128 = { /* DES */ static nettle_set_key_func openssl_des_set_key; static void -openssl_des_set_key(void *ctx, size_t length, const uint8_t *key) +openssl_des_set_key(void *ctx, const uint8_t *key) { - assert(length == 8); /* Not sure what "unchecked" means. We want to ignore parity bits, but it would still make sense to check for weak keys. */ /* Explicit cast used as I don't want to care about openssl's broken @@ -250,11 +274,11 @@ nettle_openssl_des = { /* Cast128 */ -static nettle_set_key_func openssl_cast_set_key; +static nettle_set_key_func openssl_cast128_set_key; static void -openssl_cast_set_key(void *ctx, size_t length, const uint8_t *key) +openssl_cast128_set_key(void *ctx, const uint8_t *key) { - CAST_set_key(ctx, length, key); + CAST_set_key(ctx, 16, key); } static nettle_crypt_func openssl_cast_encrypt; @@ -291,7 +315,7 @@ const struct nettle_cipher nettle_openssl_cast128 = { "openssl cast128", sizeof(CAST_KEY), 8, CAST_KEY_LENGTH, - openssl_cast_set_key, openssl_cast_set_key, + openssl_cast128_set_key, openssl_cast128_set_key, openssl_cast_encrypt, openssl_cast_decrypt }; |